Pivot Into A Network Using A Compromised Router

Other

Access devices on the internal network after gaining shell access to an environment with constraints such as low storage/memory (eg. a Linux-based microcontroller or a router).

https://helich0pper.github.io/router_rce/